openssl-vl.spec 38 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057
  1. %bcond_with fips
  2. %define build_compat32 %{?_with_compat32:1}%{!?_with_compat32:0}
  3. %{!?_pkgdocdir:%global _pkgdocdir %{_docdir}}
  4. # 1.0.0 soversion = 10
  5. # 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
  6. # depends on build configuration options)
  7. %define soversion 3
  8. %define srpmhash() %{lua:
  9. local files = rpm.expand("%_specdir/openssl.spec")
  10. for i, p in ipairs(patches) do
  11. files = files.." "..p
  12. end
  13. for i, p in ipairs(sources) do
  14. files = files.." "..p
  15. end
  16. local sha256sum = assert(io.popen("cat "..files.." 2>/dev/null | sha256sum"))
  17. local hash = sha256sum:read("*a")
  18. sha256sum:close()
  19. print(string.sub(hash, 0, 16))
  20. }
  21. Summary: Secure Sockets Layer Toolkit
  22. Name: openssl
  23. Version: 3.1.6
  24. Release: 1%{_dist_release}
  25. Group: system,security
  26. Vendor: Project Vine
  27. Distribution: Vine Linux
  28. Packager: daisuke, iwamoto
  29. License: BSDish
  30. URL: https://www.openssl.org/
  31. Source: https://www.openssl.org/source/openssl-%{version}.tar.gz
  32. Source2: Makefile.certificate
  33. Source6: make-dummy-cert
  34. Source7: renew-dummy-cert
  35. Source9: configuration-switch.h
  36. Source10: configuration-prefix.h
  37. Source14: for-tests.patch
  38. # Patches exported from source git
  39. # # Aarch64 and ppc64le use lib64
  40. Patch1: 0001-Aarch64-and-ppc64le-use-lib64.patch
  41. # # Use more general default values in openssl.cnf
  42. Patch2: 0002-Use-more-general-default-values-in-openssl.cnf.patch
  43. # # Do not install html docs
  44. Patch3: 0003-Do-not-install-html-docs.patch
  45. # # Override default paths for the CA directory tree
  46. Patch4: 0004-Override-default-paths-for-the-CA-directory-tree.patch
  47. # # apps/ca: fix md option help text
  48. Patch5: 0005-apps-ca-fix-md-option-help-text.patch
  49. # # Disable signature verification with totally unsafe hash algorithms
  50. Patch6: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
  51. # # Add support for PROFILE=SYSTEM system default cipherlist
  52. Patch7: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
  53. #Patch7: 0007-ossl_safe_getenv.patch
  54. # # Add FIPS_mode() compatibility macro
  55. Patch8: 0008-Add-FIPS_mode-compatibility-macro.patch
  56. # # Add check to see if fips flag is enabled in kernel
  57. Patch9: 0009-Add-Kernel-FIPS-mode-flag-support.patch
  58. # # Instead of replacing ectest.c and ec_curve.c, add the changes as a patch so
  59. # # that new modifications made to these files by upstream are not lost.
  60. Patch10: 0010-Add-changes-to-ectest-and-eccurve.patch
  61. # # remove unsupported EC curves
  62. Patch11: 0011-Remove-EC-curves.patch
  63. # # Disable explicit EC curves
  64. # # https://bugzilla.redhat.com/show_bug.cgi?id=2066412
  65. Patch12: 0012-Disable-explicit-ec.patch
  66. # # Skipped tests from former 0011-Remove-EC-curves.patch
  67. Patch13: 0013-skipped-tests-EC-curves.patch
  68. # # Instructions to load legacy provider in openssl.cnf
  69. #Patch24: 0024-load-legacy-prov.patch
  70. # # We load FIPS provider and set FIPS properties implicitly
  71. Patch32: 0032-Force-fips.patch
  72. # # Embed HMAC into the fips.so
  73. Patch33: 0033-FIPS-embed-hmac.patch
  74. # # Comment out fipsinstall command-line utility
  75. Patch34: 0034.fipsinstall_disable.patch
  76. # # Skip unavailable algorithms running `openssl speed`
  77. Patch35: 0035-speed-skip-unavailable-dgst.patch
  78. # # Extra public/private key checks required by FIPS-140-3
  79. Patch44: 0044-FIPS-140-3-keychecks.patch
  80. # # Minimize fips services
  81. Patch45: 0045-FIPS-services-minimize.patch
  82. # # Execute KATS before HMAC verification
  83. Patch47: 0047-FIPS-early-KATS.patch
  84. # # Selectively disallow SHA1 signatures rhbz#2070977
  85. Patch49: 0049-Allow-disabling-of-SHA1-signatures.patch
  86. # # Support SHA1 in TLS in LEGACY crypto-policy (which is SECLEVEL=1)
  87. Patch52: 0052-Allow-SHA1-in-seclevel-1-if-rh-allow-sha1-signatures.patch
  88. # # https://github.com/openssl/openssl/pull/18103
  89. # # The patch is incorporated in 3.0.3 but we provide this function since 3.0.1
  90. # # so the patch should persist
  91. Patch56: 0056-strcasecmp.patch
  92. # # https://bugzilla.redhat.com/show_bug.cgi?id=2053289
  93. Patch58: 0058-FIPS-limit-rsa-encrypt.patch
  94. # # https://bugzilla.redhat.com/show_bug.cgi?id=2087147
  95. Patch61: 0061-Deny-SHA-1-signature-verification-in-FIPS-provider.patch
  96. # 0062-fips-Expose-a-FIPS-indicator.patch
  97. Patch62: 0062-fips-Expose-a-FIPS-indicator.patch
  98. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102535
  99. Patch73: 0073-FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed.patch
  100. # [PATCH 29/46]
  101. # 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
  102. Patch74: 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
  103. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102535
  104. Patch75: 0075-FIPS-Use-FFDHE2048-in-self-test.patch
  105. # # Downstream only. Reseed DRBG using getrandom(GRND_RANDOM)
  106. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102541
  107. Patch76: 0076-FIPS-140-3-DRBG.patch
  108. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102542
  109. Patch77: 0077-FIPS-140-3-zeroization.patch
  110. # # https://bugzilla.redhat.com/show_bug.cgi?id=2114772
  111. Patch78: 0078-Add-FIPS-indicator-parameter-to-HKDF.patch
  112. # # https://github.com/openssl/openssl/pull/13817
  113. Patch79: 0079-RSA-PKCS15-implicit-rejection.patch
  114. # # We believe that some changes present in CentOS are not necessary
  115. # # because ustream has a check for FIPS version
  116. Patch80: 0080-rand-Forbid-truncated-hashes-SHA-3-in-FIPS-prov.patch
  117. # [PATCH 36/46]
  118. # 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
  119. Patch81: 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
  120. # [PATCH 37/46]
  121. # 0083-hmac-Add-explicit-FIPS-indicator-for-key-length.patch
  122. Patch83: 0083-hmac-Add-explicit-FIPS-indicator-for-key-length.patch
  123. # [PATCH 38/46]
  124. # 0084-pbkdf2-Set-minimum-password-length-of-8-bytes.patch
  125. Patch84: 0084-pbkdf2-Set-minimum-password-length-of-8-bytes.patch
  126. # 0085-FIPS-RSA-disable-shake.patch
  127. Patch85: 0085-FIPS-RSA-disable-shake.patch
  128. # 0088-signature-Add-indicator-for-PSS-salt-length.patch
  129. Patch88: 0088-signature-Add-indicator-for-PSS-salt-length.patch
  130. # 0091-FIPS-RSA-encapsulate.patch
  131. Patch91: 0091-FIPS-RSA-encapsulate.patch
  132. # [PATCH 42/46]
  133. # 0093-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch
  134. Patch93: 0093-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch
  135. # [PATCH 43/46]
  136. # 0110-GCM-Implement-explicit-FIPS-indicator-for-IV-gen.patch
  137. Patch110: 0110-GCM-Implement-explicit-FIPS-indicator-for-IV-gen.patch
  138. # [PATCH 44/46]
  139. # 0112-pbdkf2-Set-indicator-if-pkcs5-param-disabled-checks.patch
  140. Patch112: 0112-pbdkf2-Set-indicator-if-pkcs5-param-disabled-checks.patch
  141. # 0113-asymciphers-kem-Add-explicit-FIPS-indicator.patch
  142. Patch113: 0113-asymciphers-kem-Add-explicit-FIPS-indicator.patch
  143. # # We believe that some changes present in CentOS are not necessary
  144. # # because ustream has a check for FIPS version
  145. Patch114: 0114-FIPS-enforce-EMS-support.patch
  146. # security fix
  147. # none
  148. BuildRoot: %{_tmppath}/%{name}-%{version}-root
  149. BuildRequires: perl, sed
  150. BuildRequires: pkgconfig(zlib), krb5-devel
  151. BuildRequires: lksctp-tools-devel
  152. Requires: mktemp
  153. Requires: ca-certificates
  154. Requires: %{name}-libs = %{version}-%{release}
  155. Obsoletes: openssl111 < 3.0.0
  156. %define solibbase %(echo %version | sed 's/[[:alpha:]]//g')
  157. %description
  158. The OpenSSL certificate management tool and the shared libraries that
  159. provide various cryptographic algorithms and protocols.
  160. %package libs
  161. Summary: A general purpose cryptography library with TLS implementation
  162. Group: system
  163. %description libs
  164. OpenSSL is a toolkit for supporting cryptography. The openssl-libs
  165. package contains the libraries that are used by various applications which
  166. support cryptographic algorithms and protocols.
  167. %package devel
  168. Summary: OpenSSL libraries and development headers.
  169. Group: programming
  170. Requires: %{name}-libs = %{version}-%{release}
  171. Requires: krb5-devel
  172. Conflicts: openssl111-devel < 3.0.0
  173. %description devel
  174. The static libraries and include files needed to compile apps
  175. with support for various the cryptographic algorithms and protocols
  176. supported by OpenSSL.
  177. Patches for many networking apps can be found at:
  178. ftp://ftp.psy.uq.oz.au/pub/Crypto/SSLapps/
  179. %package static
  180. Summary: Libraries for static linking of applications which will use OpenSSL
  181. Group: programming
  182. Requires: %{name}-devel = %{version}-%{release}
  183. Conflicts: openssl111-static < 3.0.0
  184. %description static
  185. OpenSSL is a toolkit for supporting cryptography. The openssl-static
  186. package contains static libraries needed for static linking of
  187. applications which support various cryptographic algorithms and
  188. protocols.
  189. %package perl
  190. Summary: OpenSSL scripts which require Perl.
  191. Group: security
  192. Requires: %{name}-libs = %{version}-%{release}
  193. Obsoletes: openssl111-perl < 3.0.0
  194. Requires: perl
  195. %description perl
  196. Perl scripts provided with OpenSSL for converting certificates and keys
  197. from other formats to those used by OpenSSL.
  198. ## to build compat32 for x86_64 architecture support
  199. %package -n compat32-%{name}
  200. Summary: Secure Sockets Layer Toolkit
  201. Group: system
  202. Requires: %{name} = %{version}-%{release}
  203. %description -n compat32-%{name}
  204. The OpenSSL certificate management tool and the shared libraries that
  205. provide various cryptographic algorithms and protocols.
  206. %package -n compat32-%{name}-devel
  207. Summary: OpenSSL libraries and development headers.
  208. Group: programming
  209. Requires: compat32-%{name} = %{version}-%{release}
  210. Requires: compat32-krb5-devel
  211. Conflicts: compat32-openssl111-devel < 3.0.0
  212. %description -n compat32-%{name}-devel
  213. The static libraries and include files needed to compile apps
  214. with support for various the cryptographic algorithms and protocols
  215. supported by OpenSSL.
  216. %debug_package
  217. %prep
  218. %autosetup -n %{name}-%{version} -p1
  219. %build
  220. # Figure out which flags we want to use.
  221. # default
  222. sslarch=%{_os}-%{_target_cpu}
  223. #
  224. %ifarch %ix86
  225. sslarch=linux-elf
  226. if ! echo %{_target} | grep -q i686 ; then
  227. sslflags="no-asm 386"
  228. fi
  229. %endif
  230. %ifarch x86_64
  231. sslflags=enable-ec_nistp_64_gcc_128
  232. %endif
  233. # Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
  234. # marked as not requiring an executable stack.
  235. # Also add -DPURIFY to make using valgrind with openssl easier as we do not
  236. # want to depend on the uninitialized memory as a source of entropy anyway.
  237. RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
  238. export HASHBANGPERL=/usr/bin/perl
  239. %define fips %{version}-%{srpmhash}
  240. # ia64, x86_64, ppc are OK by default
  241. # Configure the build tree. Override OpenSSL defaults with known-good defaults
  242. # usable on all platforms. The Configure script already knows to use -fPIC and
  243. # RPM_OPT_FLAGS, so we can skip specifiying them here.
  244. ./Configure \
  245. --prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
  246. --system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
  247. zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
  248. enable-cms enable-md2 enable-rc5 enable-ktls enable-fips \
  249. no-mdc2 no-ec2m no-sm2 no-sm4 enable-buildtest-c++ \
  250. shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DREDHAT_FIPS_VERSION="\"%{fips}\""' \
  251. -Wl,--allow-multiple-definition
  252. # Do not run this in a production package the FIPS symbols must be patched-in
  253. #util/mkdef.pl crypto update
  254. make -s %{?_smp_mflags} all
  255. # Clean up the .pc files
  256. for i in libcrypto.pc libssl.pc openssl.pc ; do
  257. sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
  258. done
  259. %check
  260. # Verify that what was compiled actually works.
  261. # Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
  262. (sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
  263. (echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
  264. sed '/"msan" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
  265. touch -r configdata.pm configdata.pm.new && \
  266. mv -f configdata.pm.new configdata.pm)
  267. # We must revert patch4 before tests otherwise they will fail
  268. patch -p1 -R < %{PATCH4}
  269. #We must disable default provider before tests otherwise they will fail
  270. patch -p1 < %{SOURCE14}
  271. LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
  272. export LD_LIBRARY_PATH
  273. OPENSSL_ENABLE_MD5_VERIFY=
  274. export OPENSSL_ENABLE_MD5_VERIFY
  275. OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
  276. export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
  277. #embed HMAC into fips provider for test run
  278. OPENSSL_CONF=/dev/null LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < providers/fips.so > providers/fips.so.hmac
  279. objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
  280. mv providers/fips.so.mac providers/fips.so
  281. #run tests itself
  282. make test HARNESS_JOBS=8
  283. # Add generation of HMAC checksum of the final stripped library
  284. # We manually copy standard definition of __spec_install_post
  285. # and add hmac calculation/embedding to fips.so
  286. %define __spec_install_post \
  287. %{?__debug_package:%{__debug_install_post}} \
  288. %{__arch_install_post} \
  289. %{__os_install_post} \
  290. OPENSSL_CONF=/dev/null LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so > $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
  291. objcopy --update-section .rodata1=$RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac \
  292. mv $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so \
  293. rm $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
  294. %{nil}
  295. %define __provides_exclude_from %{_libdir}/openssl
  296. %install
  297. [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
  298. # Install OpenSSL.
  299. install -d $RPM_BUILD_ROOT{/%{_lib},%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
  300. make DESTDIR=$RPM_BUILD_ROOT install
  301. mv $RPM_BUILD_ROOT%{_libdir}/lib*.so.%{soversion} $RPM_BUILD_ROOT/%{_lib}/
  302. rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT/%{_lib}/*.so.%{soversion}
  303. for lib in $RPM_BUILD_ROOT/%{_lib}/*.so.%{version} ; do
  304. chmod 755 ${lib}
  305. ln -s -f ../../%{_lib}/`basename ${lib}` $RPM_BUILD_ROOT/%{_libdir}/`basename ${lib} .%{version}`
  306. ln -s -f `basename ${lib}` $RPM_BUILD_ROOT/%{_lib}/`basename ${lib} .%{version}`.%{soversion}
  307. done
  308. # Install a makefile for generating keys and self-signed certs, and a script
  309. # for generating them on the fly.
  310. mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
  311. install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
  312. install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
  313. install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
  314. # Move runable perl scripts to bindir
  315. mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
  316. mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
  317. # Rename man pages so that they don't conflict with other system man pages.
  318. pushd $RPM_BUILD_ROOT%{_mandir}
  319. mv man5/config.5ossl man5/openssl.cnf.5
  320. popd
  321. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
  322. mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
  323. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
  324. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
  325. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
  326. # Ensure the config file timestamps are identical across builds to avoid
  327. # mulitlib conflicts and unnecessary renames on upgrade
  328. touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
  329. touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
  330. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
  331. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
  332. %ifarch i686
  333. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fipsmodule.cnf
  334. %endif
  335. # Determine which arch opensslconf.h is going to try to #include.
  336. basearch=%{_arch}
  337. %ifarch %{ix86}
  338. basearch=i386
  339. %endif
  340. # Next step of gradual disablement of SSL3.
  341. # Make SSL3 disappear to newly built dependencies.
  342. sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
  343. #ifndef OPENSSL_NO_SSL3\
  344. # define OPENSSL_NO_SSL3\
  345. #endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
  346. %ifarch %{multilib_arches}
  347. # Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
  348. # can have both a 32- and 64-bit version of the library, and they each need
  349. # their own correct-but-different versions of opensslconf.h to be usable.
  350. install -m644 %{SOURCE10} \
  351. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
  352. cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h >> \
  353. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
  354. install -m644 %{SOURCE9} \
  355. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h
  356. %endif
  357. %clean
  358. [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
  359. %files
  360. %defattr(-,root,root)
  361. %{!?_licensedir:%global license %%doc}
  362. %license LICENSE.txt
  363. %doc NEWS.md README.md
  364. %{_pkgdocdir}/Makefile.certificate
  365. %{_bindir}/make-dummy-cert
  366. %{_bindir}/renew-dummy-cert
  367. %{_bindir}/openssl
  368. %dir %{_mandir}/man1*
  369. %{_mandir}/man1*/*
  370. %dir %{_mandir}/man5*
  371. %{_mandir}/man5*/*
  372. %dir %{_mandir}/man7*
  373. %{_mandir}/man7*/*
  374. %exclude %{_mandir}/man1/*.pl*
  375. %exclude %{_mandir}/man1/tsget*
  376. %files libs
  377. %{!?_licensedir:%global license %%doc}
  378. %license LICENSE.txt
  379. %dir %{_sysconfdir}/pki/tls
  380. %dir %{_sysconfdir}/pki/tls/certs
  381. %dir %{_sysconfdir}/pki/tls/misc
  382. %dir %{_sysconfdir}/pki/tls/private
  383. %config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
  384. %config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
  385. %attr(0755,root,root) /%{_lib}/libcrypto.so.%{version}
  386. /%{_lib}/libcrypto.so.%{soversion}
  387. %attr(0755,root,root) /%{_lib}/libssl.so.%{version}
  388. /%{_lib}/libssl.so.%{soversion}
  389. %attr(0755,root,root) %{_libdir}/engines-%{soversion}
  390. %attr(0755,root,root) %{_libdir}/ossl-modules
  391. %ifnarch i686
  392. %config(noreplace) %{_sysconfdir}/pki/tls/fipsmodule.cnf
  393. %endif
  394. %files devel
  395. %doc CHANGES.md doc/dir-locals.example.el doc/openssl-c-indent.el
  396. %{_prefix}/include/openssl
  397. %exclude %{_libdir}/lib*.a
  398. %{_libdir}/*.so
  399. %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
  400. %dir %{_mandir}/man3*
  401. %{_mandir}/man3*/*
  402. %files static
  403. %defattr(-,root,root)
  404. %attr(0644,root,root) %{_libdir}/*.a
  405. %files perl
  406. %defattr(-,root,root)
  407. %{_bindir}/c_rehash
  408. %{_bindir}/*.pl
  409. %{_bindir}/tsget
  410. %{_mandir}/man1*/*.pl*
  411. %{_mandir}/man1*/tsget*
  412. %dir %{_sysconfdir}/pki/CA
  413. %dir %{_sysconfdir}/pki/CA/private
  414. %dir %{_sysconfdir}/pki/CA/certs
  415. %dir %{_sysconfdir}/pki/CA/crl
  416. %dir %{_sysconfdir}/pki/CA/newcerts
  417. ## to build compat32 for x86_64 architecture support
  418. %if %{build_compat32}
  419. %files -n compat32-%{name}
  420. %defattr(-,root,root)
  421. %attr(0755,root,root) /%{_lib}/*.so.*
  422. %files -n compat32-%{name}-devel
  423. %defattr(-,root,root)
  424. %exclude %{_libdir}/lib*.a
  425. %attr(0755,root,root) %{_libdir}/*.so
  426. %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
  427. %endif
  428. %changelog
  429. * Mon Jun 10 2024 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.6-1
  430. - new upstream release.
  431. * Wed Jan 31 2024 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.5-1
  432. - new upstream release.
  433. * Wed Oct 25 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.4-1
  434. - new upstream release.
  435. * Wed Sep 20 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.3-1
  436. - new upstream release.
  437. * Wed Aug 02 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.10-1
  438. - new upstream release.
  439. * Tue Jul 11 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.9-1
  440. - new upstream release.
  441. * Wed Feb 08 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.8-1
  442. - new upstream release.
  443. * Wed Nov 02 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.7-1
  444. - new upstream release.
  445. * Wed Oct 12 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.6-1
  446. - new upstream release.
  447. * Wed Jul 06 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.5-1
  448. - new upstream release.
  449. * Wed Jun 22 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.4-1
  450. - new upstream release.
  451. * Wed Mar 16 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.2-1
  452. - new upstream release.
  453. * Wed Dec 15 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.1-1
  454. - new upstream release.
  455. * Thu Sep 30 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.0-1
  456. - new upstream release.
  457. * Wed Aug 25 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1l-1
  458. - new upstream release.
  459. * Fri Mar 26 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1k-1
  460. - new upstream release.
  461. - dropped ldconfig scriptlets.
  462. * Wed Feb 17 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1j-1
  463. - new upstream release.
  464. * Wed Dec 09 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1i-1
  465. - new upstream release.
  466. * Sat Nov 21 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1h-1
  467. - new upstream release.
  468. - dropped Patch43: fixed in upstream.
  469. - imported Patch55-70 from rawhide.
  470. - updated Source13.
  471. * Sat Apr 25 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1g-1
  472. - new upstream release.
  473. * Wed Apr 08 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1f-1
  474. - new upstream release.
  475. - updated Patch1.
  476. - dropped Patch54: fixed in upstream.
  477. * Wed Mar 18 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1e-1
  478. - new upstream release.
  479. - dropped Patch100 and 1000: fixed in upstream.
  480. * Fri Dec 20 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1d-2
  481. - imported Patch1000 from upstream.
  482. * Fri Sep 13 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1d-1
  483. - new upstream release.
  484. - updated Source12 and 13.
  485. - updated all patches.
  486. - imported Patch100 from upstream.
  487. * Sat Aug 24 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1c-1
  488. - new upstream release.
  489. - updated Patch37 and 41.
  490. - imported Patch52-54 from rawhide.
  491. * Mon May 06 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1b-2
  492. - fixed openssl.cnf
  493. * Sun May 05 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1b-1
  494. - new upstream release.
  495. - imported Patch36 from rawhide.
  496. - updated Patch32.
  497. * Sat Dec 08 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1a-1
  498. - new upstream release.
  499. - updated Patch2.
  500. - dropped Patch36 and 46: fixed in upstream.
  501. * Thu Nov 01 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1-2
  502. - fixed symlinks.
  503. * Thu Nov 01 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1-1
  504. - new upstream release (newest LTS version).
  505. - imported fedora stuff (except FIPS).
  506. * Sun Apr 1 2018 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2o-1
  507. - new upstream release with security fixes
  508. * Sun Jan 21 2018 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2n-1
  509. - new upstream release with security fixes
  510. * Wed Nov 15 2017 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2m-1
  511. - new upstream release with security fixes
  512. * Sun Jan 29 2017 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2k-1
  513. - new upstream release with security fixes
  514. * Thu May 5 2016 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2h-1
  515. - new upstream release with security fixes
  516. * Wed Mar 9 2016 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2g-1
  517. - new upstream release 1.0.2 with security fixes
  518. - Patch2 is merged into Patch0
  519. * Mon Dec 28 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1q-1
  520. - new upstream release with security fixes
  521. * Fri Jul 10 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1p-1
  522. - new upstream release with security fixes
  523. * Wed Jul 1 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1o-1
  524. - new upstream release
  525. * Sun Apr 12 2015 Yoji TOYODA <bsyamato@sea.plala.or.jp> 1.0.1m-1
  526. - merged into Vine6
  527. * Fri Mar 20 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1m-1
  528. - new upstream release with security fixes
  529. - update Patch2,5
  530. * Mon Jan 12 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1k-1
  531. - new upstream release with security fixes
  532. * Mon Oct 20 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1j-1
  533. - new upstream release with security fixes
  534. - add patch8 from fc21 (fix perl find.pl)
  535. * Fri Jun 6 2014 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.0.1h-1
  536. - new upstream release with security fixes.
  537. * Tue Apr 8 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1g-1
  538. - new upstream release with security fixes
  539. * Thu Jan 9 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1f-1
  540. - new upstream release with security fixes
  541. * Tue Sep 24 2013 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1e-2
  542. - move root CA bundle to ca-certificates package
  543. * Tue Feb 12 2013 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1e-1
  544. - update to 1.0.1e
  545. - 1.0.1d has major regressions from 1.0.1c
  546. * Sat Feb 9 2013 IWAI, Masaharu <iwai@alib.jp> 1.0.1d-2
  547. - remove tsget script to delete dependency perl(WWW::Curl::Easy)
  548. - openssl-perl package contains it in docdir
  549. * Fri Feb 08 2013 Toshiharu Kudoh <toshi.kd2@gmail.com> 1.0.1d-1
  550. - new upstream release with security fix (CVE-2012-2686, CVE-2013-0166, 0169)
  551. - fixed %%files
  552. * Tue May 29 2012 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1c-1
  553. - update to 1.0.1c
  554. - enable configure options:
  555. enable-camellia enable-seed enable-tlsext enable-rfc3779
  556. enable-cms enable-md2
  557. - remove no-asm option from ai64/x86_64/ppc/ppc64/i686
  558. - generate a table with the compile settings before configure
  559. * Fri Jan 20 2012 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0g-1
  560. - new upstream release with security fix (CVE-2012-0050)
  561. * Fri Jan 6 2012 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0f-1
  562. - new upstream release with security fix
  563. (CVE-2011-4108,09, CVE-2011-4576,77, CVE-2011-4619, CVE-2012-0027)
  564. * Wed Sep 7 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0e-1
  565. - new upstream release with security fix (CVE-2011-3207, 3210)
  566. * Sun Mar 20 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0d-2
  567. - rebuild with krb5-libs 1.8
  568. * Fri Feb 11 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0d-1
  569. - new upstream release with security fix
  570. * Sat Jan 15 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-4
  571. - use upstream openssl.pc instead of vine original one (SOURCE6)
  572. * Sun Jan 9 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-3
  573. - move tsget to docs to delete dependency perl(WWW::Curl::Easy)
  574. * Sat Jan 1 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-2
  575. - add R: krb5-devel into devel pkg
  576. - add R: compat32-krb5-devel into compat32-devel pkg
  577. * Fri Dec 31 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-1
  578. - new upstream release 1.0.0x
  579. - separate static libs into static package
  580. - change configure options
  581. - change so version 10
  582. - add tsget into perl package
  583. - update all patches
  584. * Thu Dec 30 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8q-2
  585. - fix changelog typo...
  586. * Tue Dec 7 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8q-1
  587. - new upstream release with security fix (CVE-2010-4180)
  588. * Wed Nov 17 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8p-1
  589. - new upstream release with security fix (CVE-2010-3864)
  590. - drop patches included in new release
  591. - update patch4
  592. * Sun Jan 17 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-5
  593. - add patch12 for fix CVE-2009-3555 (renegotiation)
  594. * Fri Jan 15 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-4
  595. - add patch11 for fix CVE-2009-4355 (memory leak)
  596. * Tue Jun 23 2009 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-3
  597. - add patch10 to fix CVE-2009-1377, 78, 79 (from fc11)
  598. * Mon Jun 22 2009 NAKAMURA Kenta <kenta@vinelinux.org> 0.9.8k-2
  599. - removed unnecessary %%if %{build_compat32} statements
  600. - removed lib*.a from devel package
  601. * Mon Mar 30 2009 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-1
  602. - new upstream release with security fix (CVE-2000-0590,0591,0789)
  603. * Sun Jan 11 2009 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8j-1
  604. - new upstream release with security fix (CVE-2008-5077)
  605. * Sat Sep 20 2008 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8i-1
  606. - new upstream release
  607. * Sat Jul 12 2008 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8h-1
  608. - new upstream release
  609. - new versioning policy
  610. * Sat Oct 27 2007 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8g-0vl1
  611. - new upstream release
  612. - drop patch10,20 which is merged in upstream
  613. * Fri Sep 28 2007 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.8e-0vl3
  614. - add security patch in advance for CVE-2007-5135
  615. http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded
  616. http://marc.info/?l=openssl-cvs&m=119020417919619&w=2
  617. * Fri Aug 10 2007 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.8e-0vl2
  618. - add security patch for CVE-2007-3108
  619. (http://openssl.org/news/patch-CVE-2007-3108.txt)
  620. * Tue May 15 2007 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8e-0vl1
  621. - new upstream release
  622. * Sun Dec 24 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7l-0vl2
  623. - update (fix) openssl.pc <BTS:437>
  624. * Fri Sep 29 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7l-0vl1
  625. - new upstream release (with security fix)
  626. * Mon Sep 11 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7k-0vl1
  627. - new upstream release
  628. - add patch2 to use RPM_OPT macro
  629. * Mon Feb 06 2006 Shu KONNO <owa@bg.wakwak.com> 0.9.7i-0vl3
  630. - moved macros _lib to /usr/lib/rpm/rpmrc or macros files
  631. * Fri Feb 03 2006 Shu KONNO <owa@bg.wakwak.com> 0.9.7i-0vl2
  632. - added compat32-* packages for x86_64 architecture support
  633. - added openssl-0.9.7i.Configure-compat32.patch
  634. - changed '/lib' to '/%{_lib}'
  635. * Mon Oct 17 2005 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.7i-0vl1
  636. - new upstream release
  637. * Mon Jan 31 2005 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.7d-0vl4
  638. - rebuild on VineSeed
  639. * Sun Jan 09 2005 IKEDA Katsumi <ikeda@webmasters.gr.jp> 0.9.7d-0vl3.1
  640. - added a security patch from Gentoo.
  641. - Patch1: openssl-0.9.7c-tempfile.patch
  642. * Sun Mar 28 2004 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.7d-0vl3
  643. - sslarch for ppc was missing... added.
  644. * Fri Mar 26 2004 Tomoya TAKA <taka@vinelinux.org> 0.9.7d-0vl2
  645. - use sslarch=linux-alpha-gcc instead of alpha-gcc
  646. * Mon Mar 22 2004 Satoshi MACHINO <machino@vinelinux.org> 0.9.7d-0vl1
  647. - new upstream version
  648. - clean up of spec file
  649. -- removed old patches
  650. * Sat Mar 20 2004 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6m-0vl1
  651. - new upstream release
  652. - SECURITY fix.
  653. - http://www.openssl.org/news/secadv_20040317.txt
  654. * Wed Oct 1 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6k-0vl1
  655. - new upstream release
  656. - [Security fix]
  657. - Vulnerabilities in ASN.1 parsing
  658. http://www.openssl.org/news/secadv_20030930.txt
  659. - see %{_docdir}/%{name}-%{version}/CHANGES for other changes
  660. * Wed Jun 04 2003 HOTTA Michihide <hotta@net-newbie.com> 0.9.6j-0vl2
  661. - add openssl.pc for pkgconfig
  662. * Tue Mar 11 2003 Satoshi MACHINO <machino@vinelinux.org> 0.9.6j-0vl1
  663. - New upstream version
  664. - dropped patch10, 11
  665. -- merged upstream version
  666. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl1
  667. - rebuild for VineSeed
  668. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl0.26.1
  669. - [Security Fix]
  670. - Timing-based attacks on RSA keys
  671. http://www.openssl.org/news/secadv_20030317.txt
  672. - Klima-Pokorny0Rosa attack on RSA in SSL/TLS
  673. http://www.openssl.org/news/secadv_20030317.txt
  674. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl0.26
  675. - new upstream release 0.9.6i
  676. - [Security Fix]
  677. - build for Vine Linux 2.6 errata
  678. * Mon Nov 18 2002 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6h-0vl1
  679. - new upstream release 0.9.6h
  680. * Mon Nov 18 2002 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6g-0vl1
  681. - new upstream release 0.9.6g
  682. * Mon Oct 28 2002 IWAI Masaharu <iwai@alib.jp> 0.9.6b-1vl6
  683. - SECURITY: CAN-2002-0659 fixed
  684. - added Patch101 from RedHat 7.2 updates 0.9.6b-28
  685. * Fri Aug 02 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-28
  686. - update asn patch to fix accidental reversal of a logic check
  687. * Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-27
  688. - update asn patch to reduce chance that compiler optimization will remove
  689. one of the added tests
  690. * Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-26
  691. - rebuild
  692. * Tue Jul 30 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-25
  693. - add patch to fix ASN.1 vulnerabilities
  694. * Wed Jul 31 2002 IWAI Masaharu <iwai@alib.jp> 0.9.6b-1vl5
  695. - rename spec file name
  696. - SECURITY: CA-2002-23 fixed
  697. - added Patch100 from RedHat 7.2 updates 0.9.6b-24
  698. * Thu Jul 25 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-24
  699. - add backport of Ben Laurie's patches for OpenSSL 0.9.6d
  700. * Mon Sep 10 2001 Satoshi MACHINO <machino@vinelinux.org> 0.9.6b-1vl4
  701. - added ${PATH} in LD_LIBRARY_PATH
  702. - added install -m 755 *.so.* $RPM_BUILD_ROOT%{_libdir} in %install
  703. * Sun Jul 15 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl3
  704. - remove --no-<cipher>
  705. * Sun Jul 15 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl2
  706. - add Patch10 for mipsel shared ( Configure )
  707. * Sat Jul 14 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl1
  708. - build for Vine Linux
  709. - use openssl-engine-0.9.6b.tar.gz
  710. * Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com>
  711. - update to 0.9.6b
  712. * Thu Jul 5 2001 Nalin Dahyabhai <nalin@redhat.com>
  713. - move .so symlinks back to %%{_libdir}
  714. * Tue Jul 3 2001 Nalin Dahyabhai <nalin@redhat.com>
  715. - move shared libraries to /lib (#38410)
  716. * Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
  717. - switch to engine code base
  718. * Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
  719. - add a script for creating dummy certificates
  720. - move man pages from %%{_mandir}/man?/foo.?ssl to %%{_mandir}/man?ssl/foo.?
  721. * Thu Jun 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  722. - add s390x support
  723. * Fri Jun 1 2001 Nalin Dahyabhai <nalin@redhat.com>
  724. - change two memcpy() calls to memmove()
  725. - don't define L_ENDIAN on alpha
  726. * Tue May 15 2001 Nalin Dahyabhai <nalin@redhat.com>
  727. - make subpackages depend on the main package
  728. * Tue May 1 2001 Nalin Dahyabhai <nalin@redhat.com>
  729. - adjust the hobble script to not disturb symlinks in include/ (fix from
  730. Joe Orton)
  731. * Thu Apr 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  732. - drop the m2crypo patch we weren't using
  733. * Tue Apr 24 2001 Nalin Dahyabhai <nalin@redhat.com>
  734. - configure using "shared" as well
  735. * Sun Apr 8 2001 Nalin Dahyabhai <nalin@redhat.com>
  736. - update to 0.9.6a
  737. - use the build-shared target to build shared libraries
  738. - bump the soversion to 2 because we're no longer compatible with
  739. our 0.9.5a packages or our 0.9.6 packages
  740. - drop the patch for making rsatest a no-op when rsa null support is used
  741. - put all man pages into <section>ssl instead of <section>
  742. - break the m2crypto modules into a separate package
  743. * Tue Mar 13 2001 Nalin Dahyabhai <nalin@redhat.com>
  744. - use BN_LLONG on s390
  745. * Mon Mar 12 2001 Nalin Dahyabhai <nalin@redhat.com>
  746. - fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)
  747. * Sat Mar 3 2001 Nalin Dahyabhai <nalin@redhat.com>
  748. - move c_rehash to the perl subpackage, because it's a perl script now
  749. * Fri Mar 2 2001 Nalin Dahyabhai <nalin@redhat.com>
  750. - update to 0.9.6
  751. - enable MD2
  752. - use the libcrypto.so and libssl.so targets to build shared libs with
  753. - bump the soversion to 1 because we're no longer compatible with any of
  754. the various 0.9.5a packages circulating around, which provide lib*.so.0
  755. * Wed Feb 28 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  756. - change hobble-openssl for disabling MD2 again
  757. * Tue Feb 27 2001 Nalin Dahyabhai <nalin@redhat.com>
  758. - re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152
  759. bytes or so, causing EVP_DigestInit() to zero out stack variables in
  760. apps built against a version of the library without it
  761. * Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  762. - disable some inline assembly, which on x86 is Pentium-specific
  763. - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)
  764. * Thu Feb 08 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  765. - fix s390 patch
  766. * Fri Dec 8 2000 Than Ngo <than@redhat.com>
  767. - added support s390
  768. * Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
  769. - remove -Wa,* and -m* compiler flags from the default Configure file (#20656)
  770. - add the CA.pl man page to the perl subpackage
  771. * Thu Nov 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  772. - always build with -mcpu=ev5 on alpha
  773. * Tue Oct 31 2000 Nalin Dahyabhai <nalin@redhat.com>
  774. - add a symlink from cert.pem to ca-bundle.crt
  775. * Wed Oct 25 2000 Nalin Dahyabhai <nalin@redhat.com>
  776. - add a ca-bundle file for packages like Samba to reference for CA certificates
  777. * Tue Oct 24 2000 Nalin Dahyabhai <nalin@redhat.com>
  778. - remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)
  779. * Mon Oct 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  780. - add unzip as a buildprereq (#17662)
  781. - update m2crypto to 0.05-snap4
  782. * Tue Sep 26 2000 Bill Nottingham <notting@redhat.com>
  783. - fix some issues in building when it's not installed
  784. * Wed Sep 6 2000 Nalin Dahyabhai <nalin@redhat.com>
  785. - make sure the headers we include are the ones we built with (aaaaarrgh!)
  786. * Fri Sep 1 2000 Nalin Dahyabhai <nalin@redhat.com>
  787. - add Richard Henderson's patch for BN on ia64
  788. - clean up the changelog
  789. * Tue Aug 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  790. - fix the building of python modules without openssl-devel already installed
  791. * Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
  792. - byte-compile python extensions without the build-root
  793. - adjust the makefile to not remove temporary files (like .key files when
  794. building .csr files) by marking them as .PRECIOUS
  795. * Sat Aug 19 2000 Nalin Dahyabhai <nalin@redhat.com>
  796. - break out python extensions into a subpackage
  797. * Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
  798. - tweak the makefile some more
  799. * Tue Jul 11 2000 Nalin Dahyabhai <nalin@redhat.com>
  800. - disable MD2 support
  801. * Thu Jul 6 2000 Nalin Dahyabhai <nalin@redhat.com>
  802. - disable MDC2 support
  803. * Sun Jul 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  804. - tweak the disabling of RC5, IDEA support
  805. - tweak the makefile
  806. * Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  807. - strip binaries and libraries
  808. - rework certificate makefile to have the right parts for Apache
  809. * Wed Jun 28 2000 Nalin Dahyabhai <nalin@redhat.com>
  810. - use %%{_perl} instead of /usr/bin/perl
  811. - disable alpha until it passes its own test suite
  812. * Fri Jun 9 2000 Nalin Dahyabhai <nalin@redhat.com>
  813. - move the passwd.1 man page out of the passwd package's way
  814. * Fri Jun 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  815. - update to 0.9.5a, modified for U.S.
  816. - add perl as a build-time requirement
  817. - move certificate makefile to another package
  818. - disable RC5, IDEA, RSA support
  819. - remove optimizations for now
  820. * Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  821. - Bero told me to move the Makefile into this package
  822. * Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  823. - add lib*.so symlinks to link dynamically against shared libs
  824. * Tue Feb 29 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  825. - update to 0.9.5
  826. - run ldconfig directly in post/postun
  827. - add FAQ
  828. * Sat Dec 18 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  829. - Fix build on non-x86 platforms
  830. * Fri Nov 12 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  831. - move /usr/share/ssl/* from -devel to main package
  832. * Tue Oct 26 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  833. - inital packaging
  834. - changes from base:
  835. - Move /usr/local/ssl to /usr/share/ssl for FHS compliance
  836. - handle RPM_OPT_FLAGS